2 results (0.003 seconds)

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface. Una vulnerabilidad de omisión de autenticación de token de sesión débil en Trend Micro IM Security versiones 1.6 y 1.6.5, podría permitir a un atacante remoto adivinar el token de sesión de los administradores que han iniciado sesión actualmente para obtener acceso a la interfaz de administración web del producto This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro IM Security. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web console, which listens on TCP port 16373 by default. The issue results from the use of guessable session tokens. An attacker can leverage this vulnerability to bypass authentication on the system. • https://success.trendmicro.com/solution/000286439 https://www.zerodayinitiative.com/advisories/ZDI-21-525 • CWE-287: Improper Authentication •

CVSS: 7.0EPSS: 0%CPEs: 12EXPL: 0

Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run. Trend Micro ha reempaquetado instaladores para varios productos de Trend Micro que usaron una versión de un paquete de instalación que tenía una vulnerabilidad de secuestro de DLL, que podría ser explotada durante la instalación de un nuevo producto. Se encontró que la vulnerabilidad SOLO es explotable durante la instalación inicial del producto por parte de un usuario autorizado. • https://success.trendmicro.com/solution/1123562 • CWE-427: Uncontrolled Search Path Element •